Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Expand
titleTable Of Contents

Table of Contents
printablefalse

Recommended Configuration Steps

...

Info

See the General Object Configuration

...

 guide for assistance configuring the General tab.

Overview

The Role object is one part of the ACM security configuration. When user security is enabled (by enabling the option in the $Server object), the User objects and Role objects work together to define:

  • Which user or group accounts can connect to ACM
  • Which configuration changes they are allowed to make
  • Which commands they're allowed to execute.

The Security section of the User Guide has further explanations and examples of security configuration concepts.

...

Use this section to control whether users of the assigned this role have permission to make changes to the selected object types and properties. The permissions can be set up to allow access to specific properties and deny the rest, or to deny access to specific properties and allow the rest.

...

Use this section to control whether users of the users assigned this role have permission to execute commands on the selected object types. The permissions can be set up to allow access to specific commands and deny the rest, or to deny access to specific commands and allow the rest.

...

Use this section to control whether users of the users assigned this role have permission to create specific types of objects. The permissions can be set up to allow creation of specific object types and deny the rest, or to deny creation of specific object types and allow the rest.

...

Use this section to control whether users of the users assigned this role have permission to delete specific types of objects. The permissions can be set up to allow deletion of specific object types and deny the rest, or to deny deletion of specific object types and allow the rest.

...

The Configure Security privilege allows non-admin users to create/modify/delete User and Role objects as well as enable/disable security. 

Info
If the $Server "Windows administrators have full access" property is enabled, members of the Windows Administrators group will also be able to configure all objects including security objects.